スポンサーリンク
Japan Advanced Inst. Sci. And Technol. Ishikawa‐ken Jpn | 論文
- Fundamental Protocols to Gather Information in Wireless Sensor Networks(Regular Section)
- An Energy-Efficient Initialization Protocol for Wireless Sensor Networks with No Collision Detection
- Energy-Efficient Initialization Protocols for Ad-Hoc Radio Networks
- Proposal of an Automatic Signature Scheme Using a Compiler (Special Section on Cryptography and Information Security)
- Permutation Cipher Scheme Using Polynomials over a Field
- Distributed QoS Scheme for Multimedia Communication in Mobile Ad Hoc Network(Advances in Ad Hoc Mobile Communications and Networking)
- B-15-21 Admission Control and Simple Class based QoS Provisioning for Mobile Ad hoc Networks
- Doubly-Logarithmic Energy-Efficient Initialization Protocols for Single-Hop Radio Networks(Special Section on Discrete Mathematics and Its Applications)
- A Systematic Design of Fault Tolerant Systolic Arrays Based on Triple Modular Redundancy in Time-Processor Space
- Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications)
- Dynamical Associative Memory based on Synchronization in Chaotic Neural Network : Proposal for the Scenario via Spatio-Temporal Symmetry Recovering Bifurcation
- Dynamical Associative Memory based on Synchronization in Chaotic Neural Network : Proposal for the Scenario via Spatio-Temporal Symmetry Recovering Bifurcation
- Synchronization and Dynamical Associative Memory in Chaotic Neural Network
- Boson Mean Field Theory of the Triangular Lattice Heisenberg Model
- A Handprinted Character Recognition System Using Image Transformation Based on Partial Inclination Detection (Special Issue on Character Recognition and Document Understanding)
- The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem(Public Key Cryptography)(Cryptography and Information Security)
- Complexity Analysis of the Cryptographic Primitive Problems through Square-Root Exponent(Discrete Mathematics and Its Applications)
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks : Special Section on Cryptography and Information Security
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
- Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security)